CN111985073A - Method and device for automatic merging and breaking of button - Google Patents

Method and device for automatic merging and breaking of button Download PDF

Info

Publication number
CN111985073A
CN111985073A CN202010101612.5A CN202010101612A CN111985073A CN 111985073 A CN111985073 A CN 111985073A CN 202010101612 A CN202010101612 A CN 202010101612A CN 111985073 A CN111985073 A CN 111985073A
Authority
CN
China
Prior art keywords
attacker
buckles
buckle
merging
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010101612.5A
Other languages
Chinese (zh)
Other versions
CN111985073B (en
Inventor
钱剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong 3vjia Information Technology Co Ltd
Original Assignee
Guangdong 3vjia Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong 3vjia Information Technology Co Ltd filed Critical Guangdong 3vjia Information Technology Co Ltd
Priority to CN202010101612.5A priority Critical patent/CN111985073B/en
Publication of CN111985073A publication Critical patent/CN111985073A/en
Application granted granted Critical
Publication of CN111985073B publication Critical patent/CN111985073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a method and a device for automatic combination and interruption of a attacker, and relates to the technical field of automatic combination and interruption of the attacker. The method comprises the following steps: acquiring a plurality of cabinet bodies to be planned, and generating a buckle for each cabinet body to obtain buckle information of the plurality of buckles; if the plurality of the handgrips are determined to be positioned on the same straight line based on the information of the handgrips, and the distance between any two adjacent handgrips in the plurality of the handgrips is smaller than or equal to a preset threshold value, combining the plurality of the handgrips to obtain the combined length of the handgrips; a attacker for performing an automatic breaking operation is determined among the plurality of attackers based on the attacker merging length. The method and the device for automatically merging and interrupting the attacker can automatically merge and interrupt the attacker by using the computer, are simple to operate, have high accuracy in automatically merging and interrupting the attacker, and save materials.

Description

Method and device for automatic merging and breaking of button
Technical Field
The invention relates to the technical field of automatic merging and breaking of a attacker, in particular to a method and a device for automatically merging and breaking the attacker.
Background
At present, in the existing home decoration design process, the automatic merging and breaking process of the clasps cannot be provided, and designers still need to manually merge and break the clasps, so that the designers need to manually enter a design field to measure and calculate various sizes, the precision is low easily caused by manual measurement errors and calculation errors, and the material waste is caused.
Disclosure of Invention
In view of the above, the present invention provides a method and an apparatus for automatic merging and interrupting of a attacker, so as to solve the technical problems of low accuracy and material waste caused by human measurement errors and calculation errors.
In a first aspect, an embodiment of the present invention provides a method for automatic merging and interrupting of a attacker, where the method includes the following steps:
acquiring a plurality of cabinet bodies to be planned, and generating a buckle for each cabinet body to obtain buckle information of the plurality of buckles;
if the plurality of the handgrips are determined to be positioned on the same straight line based on the information of the handgrips, and the distance between any two adjacent handgrips in the plurality of the handgrips is smaller than or equal to a preset threshold value, combining the plurality of the handgrips to obtain the combined length of the handgrips;
determining a attacker for performing an automatic breaking operation among the plurality of attackers based on the attacker merging length.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where determining, from among the plurality of buckles, a buckle for performing an automatic interruption operation based on the buckle merge length includes:
if the merged length of the buckles exceeds the preset maximum length, determining a target buckle in the plurality of buckles, wherein the target buckle is the buckle at the joint of two cabinets closest to the preset maximum length in the plurality of buckles;
and determining the target attacker as the attacker for executing the automatic interruption operation.
With reference to the first aspect, an embodiment of the present invention provides a second possible implementation manner of the first aspect, where the method further includes:
and if the plurality of the clasps are not positioned on the same straight line or the distance between two adjacent clasps is larger than a preset threshold value, determining that the plurality of the clasps do not need to be combined.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present invention provides a third possible implementation manner of the first aspect, where the method further includes:
and if the merging length of the plurality of the buckles does not exceed the preset maximum length, the plurality of the buckles keep in a merging state.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, wherein the plurality of handgrips have the same size and are made of the same material.
In a second aspect, an embodiment of the present invention further provides an apparatus for automatic merging and interrupting of a attacker, where the apparatus includes:
the system comprises a buckle generation module, a storage module and a control module, wherein the buckle generation module is used for acquiring a plurality of cabinets to be planned and generating a buckle for each cabinet to obtain buckle information of the plurality of buckles;
the buckle merging module is used for merging the plurality of buckles to obtain a buckle merging length if the plurality of buckles are located on the same straight line and the distance between any two adjacent buckles in the plurality of buckles is smaller than or equal to a preset threshold value based on the buckle information;
a breaking module for determining a attacker for performing an automatic breaking operation among the plurality of attackers based on the attacker merging length.
With reference to the second aspect, an embodiment of the present invention provides a first possible implementation manner of the second aspect, where the interrupting module is configured to:
if the merged length of the buckles exceeds the preset maximum length, determining a target buckle in the plurality of buckles, wherein the target buckle is the buckle at the joint of two cabinets closest to the preset maximum length in the plurality of buckles;
and determining the target attacker as the attacker for executing the automatic interruption operation.
With reference to the second aspect, an embodiment of the present invention provides a second possible implementation manner of the second aspect, where the apparatus further includes:
the holding module is used for holding the plurality of the buckles in the combined state if the combined length of the plurality of the buckles does not exceed the preset maximum length.
In a third aspect, an embodiment of the present invention further provides a server, where the server includes: a processor and a memory, the memory storing computer-executable instructions executable by the processor, the processor executing the computer-executable instructions to implement the method described above.
In a fourth aspect, embodiments of the present invention also provide a computer-readable storage medium storing computer-executable instructions that, when invoked and executed by a processor, cause the processor to implement the method described above.
The embodiment of the invention has the following beneficial effects: the method and the device for automatically merging and interrupting the buckles provided by the embodiment of the invention are characterized in that firstly, one buckle is generated for each cabinet body to obtain buckle information of a plurality of buckles, then the plurality of buckles are merged to obtain the merging length of the buckles when the plurality of buckles are determined to be positioned on the same straight line and the distance between any two adjacent buckles is smaller than or equal to a preset threshold value, and finally the buckle for executing the automatic interruption operation is determined based on the merging length of the buckles. The method and the device for automatically merging and interrupting the attacker can automatically merge and interrupt the attacker by using the computer, are simple to operate, have high accuracy in automatically merging and interrupting the attacker, and save materials.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a method for automatic merging and breaking of a attacker according to an embodiment of the present invention;
FIG. 2 is a flow chart of another method for automatic merging and interrupting of a attacker provided by an embodiment of the present invention;
FIG. 3 is a block diagram of an apparatus for automatic merging and breaking of a attacker according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, in the existing home decoration design process, the automatic merging and breaking process of the clasps cannot be provided, and designers still need to manually merge and break the clasps, so that the designers need to manually enter a design field to measure and calculate various sizes, the precision is low easily caused by manual measurement errors and calculation errors, and the material waste is caused. Based on this, the embodiments of the present invention provide a method and an apparatus for automatic merging and breaking of a attacker, so as to alleviate the above problems.
In order to facilitate understanding of the embodiment, a detailed description will be given to an automatic attacker merging and breaking method disclosed in the embodiment of the present invention.
In one possible embodiment, the present invention provides a method for automatic merging and breaking of a attacker. Fig. 1 is a flowchart of a method for automatic merging and interrupting of a attacker according to an embodiment of the present invention, where the method includes the following steps:
step S102: the method comprises the steps of obtaining a plurality of cabinet bodies to be planned, generating a buckle for each cabinet body, and obtaining buckle information of the plurality of buckles.
Step S104: and if the plurality of the buckles are determined to be positioned on the same straight line based on the buckle information, and the distance between any two adjacent buckles in the plurality of the buckles is smaller than or equal to a preset threshold value, combining the plurality of the buckles to obtain the buckle combination length.
Step S106: determining a attacker for performing an automatic breaking operation among the plurality of attackers based on the attacker merging length.
The embodiment of the invention has the following beneficial effects: the embodiment of the invention provides an automatic buckle combining and interrupting method, which comprises the steps of firstly generating a buckle for each cabinet body to obtain buckle information of a plurality of buckles, then combining the plurality of buckles to obtain a buckle combining length when the plurality of buckles are positioned on the same straight line and the distance between any two adjacent buckles is smaller than or equal to a preset threshold value, and finally determining the buckle for executing automatic interrupting operation based on the buckle combining length. The method and the device for automatically merging and interrupting the attacker can automatically merge and interrupt the attacker by using the computer, are simple to operate, have high accuracy in automatically merging and interrupting the attacker, and save materials.
In practical use, in order to describe in more detail a process of determining a attacker for performing an automatic breaking operation among a plurality of attackers based on attacker merging length, an embodiment of the present invention shows a flowchart of another method for automatic attacker merging and breaking provided by an embodiment of the present invention in fig. 2, where the method includes the following steps:
step S202: the method comprises the steps of obtaining a plurality of cabinet bodies to be planned, generating a buckle for each cabinet body, and obtaining buckle information of the plurality of buckles.
It should be further noted that the plurality of cabinets to be planned are preferably the same material cabinet.
Step S204: if so, selecting the target front water retaining from the plurality of front water retaining, and setting a starting point and an end point of the target back-off to be generated in the target front water retaining.
Step S206: and if the plurality of the buckles are determined to be positioned on the same straight line based on the buckle information, and the distance between any two adjacent buckles in the plurality of the buckles is smaller than or equal to a preset threshold value, combining the plurality of the buckles to obtain the buckle combination length.
Step S208: and if the merging length of the clasps exceeds the preset maximum length, determining a target clasper in the claspers.
The target buckle is the buckle at the joint of the two cabinets with the maximum length closest to the preset length in the plurality of buckles.
It should be further noted that if the maximum length is not preset, the system cannot automatically interrupt.
Step S210: and determining the target attacker as the attacker for executing the automatic interruption operation.
After a attacker used for executing automatic interruption operation is determined, the attacker merging and interruption scheme is saved and sent to an enterprise for production.
Further, the data of the schema needs to be converted into a format supported by the enterprise.
In actual use, when one or both of the two conditions in step S206 are not satisfied, it is determined that the plurality of the gripping hands do not need to be merged.
Specifically, the method further comprises:
and if the plurality of the clasps are not positioned on the same straight line or the distance between two adjacent clasps is larger than a preset threshold value, determining that the plurality of the clasps do not need to be combined.
When the combined length of the plurality of the buckles does not exceed the preset maximum length in actual use, the plurality of the buckles keep the combined state.
Specifically, the method further comprises:
and if the merging length of the plurality of the buckles does not exceed the preset maximum length, the plurality of the buckles keep in a merging state.
It should be noted that the dimensions of the plurality of clasps are the same and the materials are the same.
In summary, according to the automatic attacker merging and interrupting method provided by the invention, firstly, one attacker is generated for each cabinet body to obtain attacker information of a plurality of attackers, then, when the plurality of attackers are determined to be positioned on the same straight line and the distance between any two adjacent attackers is smaller than or equal to the preset threshold value, the plurality of attackers are merged to obtain attacker merging length, and finally, the attacker for executing automatic interruption operation is determined based on the attacker merging length. The method and the device for automatically merging and interrupting the attacker can automatically merge and interrupt the attacker by using the computer, are simple to operate, have high accuracy in automatically merging and interrupting the attacker, and save materials.
In another possible implementation manner, corresponding to the method for automatic merging and interrupting of a attacker provided in the foregoing implementation manner, an embodiment of the present invention further provides an apparatus for automatic merging and interrupting of a attacker, and fig. 3 is a block diagram of a structure of an apparatus for automatic merging and interrupting of a attacker provided in an embodiment of the present invention. As shown in fig. 3, the apparatus includes:
the attacker generation module 301 is configured to acquire a plurality of cabinets to be planned, and generate an attacker for each cabinet to obtain attacker information of the plurality of attackers;
the buckle merge module 302 is configured to merge the multiple buckles to obtain a buckle merge length if it is determined that the multiple buckles are located on the same straight line and a distance between any two adjacent buckles in the multiple buckles is smaller than or equal to a preset threshold based on the buckle information;
a breaking module 303 configured to determine a attacker for performing an automatic breaking operation among the plurality of attackers based on the attacker merging length.
In actual use, the interrupting module 303 is configured to:
if the merged length of the buckles exceeds the preset maximum length, determining a target buckle in the plurality of buckles, wherein the target buckle is the buckle at the joint of two cabinets closest to the preset maximum length in the plurality of buckles;
and determining the target attacker as the attacker for executing the automatic interruption operation.
In practical use, the apparatus further comprises:
the holding module is used for holding the plurality of the buckles in the combined state if the combined length of the plurality of the buckles does not exceed the preset maximum length.
In yet another possible implementation manner, an embodiment of the present invention further provides a server, and fig. 4 shows a schematic structural diagram of the server provided in the embodiment of the present invention, and referring to fig. 4, the server includes: a processor 400, a memory 401, a bus 402 and a communication interface 403, the processor 400, the memory 401, the communication interface 403 and the communication interface being connected by the bus 402; the processor 400 is used to execute executable modules, such as computer programs, stored in the memory 401.
Wherein the memory 401 stores computer-executable instructions that can be executed by the processor 400, the processor 400 executes the computer-executable instructions to implement the methods described above.
Further, the Memory 401 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 403 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
Bus 402 can be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
The memory 401 is used for storing a program, and the processor 400 executes the program after receiving a program execution instruction, and the method for automatic attacker merging and breaking disclosed by any embodiment of the foregoing invention may be applied to the processor 400, or implemented by the processor 400.
Further, processor 400 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 400. The Processor 400 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 401, and the processor 400 reads the information in the memory 401 and completes the steps of the method in combination with the hardware.
In yet another possible implementation, the embodiment of the present invention further provides a computer-readable storage medium storing computer-executable instructions, which, when invoked and executed by a processor, cause the processor to implement the method described above.
The automatic attacker merging and interrupting device provided by the embodiment of the invention has the same technical characteristics as the automatic attacker merging and interrupting method provided by the embodiment, so that the same technical problems can be solved, and the same technical effect can be achieved.
The computer program product of the method and the device for automatic merging and interrupting of a attacker provided by the embodiment of the present invention includes a computer readable storage medium storing a program code, and instructions included in the program code may be used to execute the method described in the foregoing method embodiment.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases for those skilled in the art.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a ReaD-Only Memory (ROM), a RanDom Access Memory (RAM), a magnetic disk, or an optical disk.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that the following embodiments are merely illustrative of the present invention, and not restrictive, and the scope of the present invention is not limited thereto: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for automated attacker merging and interrupting, the method comprising the steps of:
acquiring a plurality of cabinet bodies to be planned, and generating a buckle for each cabinet body to obtain buckle information of the plurality of buckles;
if the plurality of the handgrips are determined to be positioned on the same straight line based on the information of the handgrips, and the distance between any two adjacent handgrips in the plurality of the handgrips is smaller than or equal to a preset threshold value, combining the plurality of the handgrips to obtain the combined length of the handgrips;
determining a attacker for performing an automatic breaking operation among the plurality of attackers based on the attacker merging length.
2. The method of claim 1, wherein determining a attacker among the plurality of attackers to perform an automatic breaking operation based on the attacker merge length comprises:
if the merged length of the buckles exceeds the preset maximum length, determining a target buckle in the plurality of buckles, wherein the target buckle is the buckle at the joint of two cabinets closest to the preset maximum length in the plurality of buckles;
and determining the target attacker as the attacker for executing the automatic interruption operation.
3. The method of claim 1, further comprising:
and if the plurality of the clasps are not positioned on the same straight line or the distance between two adjacent clasps is larger than a preset threshold value, determining that the plurality of the clasps do not need to be combined.
4. The method of claim 1, further comprising:
and if the merging length of the plurality of the buckles does not exceed the preset maximum length, the plurality of the buckles keep in a merging state.
5. The method of claim 1, wherein the plurality of clasps are the same size and are of the same material.
6. An apparatus for automated attacker merging and breaking, the apparatus comprising:
the system comprises a buckle generation module, a storage module and a control module, wherein the buckle generation module is used for acquiring a plurality of cabinets to be planned and generating a buckle for each cabinet to obtain buckle information of the plurality of buckles;
the buckle merging module is used for merging the plurality of buckles to obtain a buckle merging length if the plurality of buckles are located on the same straight line and the distance between any two adjacent buckles in the plurality of buckles is smaller than or equal to a preset threshold value based on the buckle information;
a breaking module for determining a attacker for performing an automatic breaking operation among the plurality of attackers based on the attacker merging length.
7. The apparatus of claim 6, wherein the breaking module is to:
if the merged length of the buckles exceeds the preset maximum length, determining a target buckle in the plurality of buckles, wherein the target buckle is the buckle at the joint of two cabinets closest to the preset maximum length in the plurality of buckles;
and determining the target attacker as the attacker for executing the automatic interruption operation.
8. The apparatus of claim 6, wherein the apparatus comprises:
the holding module is used for holding the plurality of the buckles in the combined state if the combined length of the plurality of the buckles does not exceed the preset maximum length.
9. A server comprising a processor and a memory, the memory storing computer-executable instructions executable by the processor, the processor executing the computer-executable instructions to implement the method of any one of claims 1 to 5.
10. A computer-readable storage medium having stored thereon computer-executable instructions that, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1 to 5.
CN202010101612.5A 2020-02-18 2020-02-18 Method and device for automatic combination and breaking of buckles Active CN111985073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010101612.5A CN111985073B (en) 2020-02-18 2020-02-18 Method and device for automatic combination and breaking of buckles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010101612.5A CN111985073B (en) 2020-02-18 2020-02-18 Method and device for automatic combination and breaking of buckles

Publications (2)

Publication Number Publication Date
CN111985073A true CN111985073A (en) 2020-11-24
CN111985073B CN111985073B (en) 2024-01-19

Family

ID=73441710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010101612.5A Active CN111985073B (en) 2020-02-18 2020-02-18 Method and device for automatic combination and breaking of buckles

Country Status (1)

Country Link
CN (1) CN111985073B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150093990A1 (en) * 2013-09-27 2015-04-02 Xintian E. Lin Techniques for proximity detection for wireless docking
CN105787165A (en) * 2016-02-23 2016-07-20 北京数码大方科技股份有限公司 Arrangement method and device for furniture connecting pieces
US20170192589A1 (en) * 2014-11-19 2017-07-06 Baidu Online Network Technology (Beijing) Co., Ltd. Method and device for adjusting object attribute information
CN107358372A (en) * 2017-07-25 2017-11-17 杭州纳戒科技有限公司 Box for material circulation distribution method, device and electronic equipment
CN107667366A (en) * 2015-03-24 2018-02-06 开利公司 System and method for capturing and analyzing multidimensional building information
CN110688691A (en) * 2019-08-15 2020-01-14 杭州群核信息技术有限公司 Software design method for freely drawing table top based on Kujiale cloud design platform
CN110781541A (en) * 2019-10-08 2020-02-11 江苏艾佳家居用品有限公司 Region merging method and system for home decoration design drawing
CN110781539A (en) * 2019-09-29 2020-02-11 江苏艾佳家居用品有限公司 Automatic design method and system for house type graph

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150093990A1 (en) * 2013-09-27 2015-04-02 Xintian E. Lin Techniques for proximity detection for wireless docking
US20170192589A1 (en) * 2014-11-19 2017-07-06 Baidu Online Network Technology (Beijing) Co., Ltd. Method and device for adjusting object attribute information
CN107667366A (en) * 2015-03-24 2018-02-06 开利公司 System and method for capturing and analyzing multidimensional building information
CN105787165A (en) * 2016-02-23 2016-07-20 北京数码大方科技股份有限公司 Arrangement method and device for furniture connecting pieces
CN107358372A (en) * 2017-07-25 2017-11-17 杭州纳戒科技有限公司 Box for material circulation distribution method, device and electronic equipment
CN110688691A (en) * 2019-08-15 2020-01-14 杭州群核信息技术有限公司 Software design method for freely drawing table top based on Kujiale cloud design platform
CN110781539A (en) * 2019-09-29 2020-02-11 江苏艾佳家居用品有限公司 Automatic design method and system for house type graph
CN110781541A (en) * 2019-10-08 2020-02-11 江苏艾佳家居用品有限公司 Region merging method and system for home decoration design drawing

Also Published As

Publication number Publication date
CN111985073B (en) 2024-01-19

Similar Documents

Publication Publication Date Title
CN111177445B (en) Standard primitive determination method, primitive identification method, device and electronic equipment
CN110866259A (en) Method and system for calculating potential safety hazard score based on multi-dimensional data
CN111885165B (en) Equipment data acquisition transmission and reverse control method and device
CN111104594A (en) Market quotation pushing method and device
WO2022021650A1 (en) Step counting method, step counting device, and computer readable storage medium
CN110750539A (en) Redis database-based information query method and device and electronic equipment
CN108563774B (en) GPS data processing method and device
CN111985073A (en) Method and device for automatic merging and breaking of button
CN106959806B (en) Page identity obtaining method and device
CN111462277B (en) Method and device for generating target line of wall sticker to be processed
CN110570171B (en) Transaction pool node synchronization method, electronic device and computer-readable storage medium
CN111339647A (en) Table-board back-off automatic generation method and device
CN110796722A (en) Three-dimensional rendering presentation method and device
CN110650100A (en) Method and device for capturing network card data packet and electronic equipment
CN111522655A (en) Method and device for determining software memory consumption
CN114463413A (en) Monitoring method and device based on distribution network device and electronic equipment
CN111273213A (en) Ammeter calibration method and device
CN111459638A (en) Main thread waiting time determination method and device
CN112086158A (en) Intelligent ward intelligent nursing interaction method based on big data and server platform
CN111352825A (en) Data interface test method and device and server
CN111782479A (en) Log processing method and device, electronic equipment and computer readable storage medium
CN110975285B (en) Smooth cutter light acquisition method and device
CN111274640A (en) Application method and device between sample boards and electronic equipment
CN111159196A (en) Block chain data storage and acquisition method and device based on fragmentation
CN111173234A (en) Automatic skirting line generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant